The Alert Wasn’t Understood
“Low confidence.” “Informational.” “No automated action.” It looked like nothing. But once the behaviour was investigated across process execution, outbound traffic and identity telemetry, the story changed completely.
This is where Microsoft security operations visibility becomes critical — not just reading the label on an alert, but understanding what the signal actually means.
Briefing summary
A single Defender XDR alert looked harmless on the surface. But once the behaviour was hunted instead of dismissed, it exposed a chain across PowerShell, outbound communication, identity activity and time correlation.
What happened
The pivot that changed everything
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
let SuspiciousPowerShell = DeviceProcessEvents | where FileName =~ "powershell.exe" | where ProcessCommandLine contains "-enc" or ProcessCommandLine contains "FromBase64String" or ProcessCommandLine contains "IEX" | project PS_Time = Timestamp, DeviceName, User = InitiatingProcessAccountName, CommandLine = ProcessCommandLine; let NetworkActivity = DeviceNetworkEvents | where InitiatingProcessFileName =~ "powershell.exe" | project Net_Time = Timestamp, DeviceName, User = InitiatingProcessAccountName, RemoteIP, RemoteUrl, RemotePort; let IdentityActivity = SigninLogs | where ResultType == 0 | project SignIn_Time = TimeGenerated, User = UserPrincipalName, IPAddress, Location = strcat(tostring(LocationDetails.city), ", ", tostring(LocationDetails.countryOrRegion)); SuspiciousPowerShell | join kind=leftouter NetworkActivity on DeviceName, User | where Net_Time between (PS_Time .. PS_Time + 10m) | join kind=leftouter IdentityActivity on User | where SignIn_Time between (PS_Time - 15m .. PS_Time + 15m) | project PS_Time, DeviceName, User, CommandLine, RemoteIP, RemoteUrl, IPAddress, Location, SignIn_Time | order by PS_Time desc
Agent Foskett moment
That is why stronger identity and access visibility matters so much.
Final thought
If your Microsoft security stack is collecting signals but not surfacing real meaning, the next step is improving visibility and interpretation. 👉 Strengthen Azure security visibility and detection
Develop IT. Protect IT. GEMXIT PTY LTD | GEMXIT UK LTD